From bcdd6e36ff46c876f7784c9daffeb5c6a313a26c Mon Sep 17 00:00:00 2001 From: lidf Date: Sun, 12 Apr 2026 15:56:18 +0800 Subject: [PATCH] fix(backend): remove leaked request variable causing SSE task execution failure --- backend/gateway/platforms/deepview_sse.py | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/backend/gateway/platforms/deepview_sse.py b/backend/gateway/platforms/deepview_sse.py index e19bd9a..6f1010d 100644 --- a/backend/gateway/platforms/deepview_sse.py +++ b/backend/gateway/platforms/deepview_sse.py @@ -528,16 +528,13 @@ class DeepviewSSEServer: db = SessionDB() loop = asyncio.get_event_loop() - # 此处获取 user 的 userId - userObj = await self._extractUser(request) - userId = userObj.get("sub", "unknown") if userObj else "unknown" - # 从环境变量获取存储根目录,并获取用户专属沙箱与机构知识域 storageDir = os.getenv("DEEPVIEW_STORAGE_DIR", os.path.expanduser("~/Downloads/Coding/医生助理智能体/backend/storage")) userDir = self._getUserStorageDir(userId) # 解析 orgId - orgId = userObj.get("org", "org_001") if userObj else "org_001" + orgId = "org_001" + orgDir = self._getOrgStorageDir(orgId) platformDir = os.path.join(storageDir, "platform") @@ -984,6 +981,11 @@ xray.module5: track1(数组,每项含node/action/strategy/purpose), track2(数 reportData = json.loads(row[0]) clientId = row[2] + + # Hot patch reportCode for older generated reports that might have hallucinated ones + reportData["reportCode"] = f"DW-AMXG-{reportId[4:].upper()}" + reportData["id"] = reportId + # Attach clientId into the data payload so the frontend knows if it's archived if clientId: reportData["clientId"] = clientId